Network security assessment based on full host-based attack graph.
Xiao-fan WangTian-yang ZhouJun-hu ZhuPublished in: CIAT (2020)
Keyphrases
- network security
- attack graph
- risk assessment
- situation assessment
- intrusion detection
- attack graphs
- computer networks
- intrusion detection system
- alert correlation
- security policies
- dos attacks
- traffic analysis
- information security
- anomaly detection
- computer security
- security protection
- network traffic
- security breaches
- network administrators
- ip networks
- network configuration
- security management
- network monitoring
- databases
- monitoring system
- knowledge management
- probabilistic model